Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> I could bet that most of these "new Rust safe programs" will start like this: unsafe { // your code goes here }

I'll take your bet. Most Rust program I've seen don't use unsafe or when they do, it is fairly limited in scope.



One step further, many rust libs use `#![forbid(unsafe_code)]` to explicitly disallow any unsafe. The rust community really likes that sort of thing, and for good reason.


Rust is not widely adopted yet. When the mass of sloppy programmers are required to write code (applications, drivers, etc.) in Rust, you will take the bet back.


I disagree. Rust is more widely adopted than you think, more so in mission critical software. Every major player uses it. It runs on embedded, Android, iOS, in your browser, it’s in the Linux kernel. Things will just be accelerating from here.


Rust in Linux kernel is a bold statement. It's a PoC, nothing relevant is implement in it yet.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: